Your SlideShare is downloading. ×

Securing password

156
views

Published on

The importance of a secured system.

The importance of a secured system.

Published in: Education

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
156
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Splendorcollege
  • 2. What is password A secret series of characters that enables a user to access a file, computer, or program. On multi-user systems, each user must enter his or her password before the computer will respond to commands
  • 3. Why passwords are important To guarantee security to personal information To prevent unauthorized access to user accounts To prevent unauthorized access to important information To be able to use various Internet services securely
  • 4. Internal password theft is easy  Can be heard while giving it out to someone you trust.  Someone looking over your shoulder can discover it.  When kept in a desk drawer, on a monitor or under a keyboard.  Social Engineering.
  • 5. Secure your password Your password is only yours. Do NOT: Never tell any one your  Say your password aloud. password, including  E-mail your password to a supervisors, personal co-worker. assistants, or IT personnel.  Offer anyone hints Change your password often about what your password Never write down your might be. password.
  • 6. Create a strong password A strong password guarantees maximum protection  Length. Make your passwords long with eight or more characters.  Complexity. Use the entire keyboard.  Variety. Dont use the same password for everything.  Variation: Change them often.
  • 7. Weak password Sequences or repeated characters. Examples: 12345678, 222222, abcdefg, or adjacent letters on your keyboard. Words spelled backwards, common misspellings, and abbreviations. Personal information. Your name, birthday, drivers license, passport number, or similar information. Dictionary words in any language.
  • 8. Examples of bad passwords Sports teams or terms: FootballcluB Number sequence: *12345* Letter string: BBBBBB Mixed-case sequence: ABcdEFgh Company name: NkemIT Keyboard sequence: AsdfG or QwErty
  • 9. Better passwordsOriginal password: New password:• FootballCluB • F*7o12S6Lua• NkemIT • nK&5i8• WaRty • Y9#RW^a• EArThing • 970RTg8%• 2RepublicTech8 • T3CH&R3pU7Lic
  • 10. ConclusionA strong password can protect your personal account.A password is the key to your organization’s resources.Try and develop a strong passwords that are not obvious tosomeone familiar with you.Remember to change your password on a regular basis.
  • 11. ReferencesGollmann, D. (2011). Identification and Authentication. In:Computer Security. 3rd ed. West Sussex: John Wiley & Sons Ltd.p39-64IT Services. (2011) Password. Wolverhampton: University ofWolverhampton IT Service. Microsoft. (2012). Create strong passwords. Available:http://www.microsoft.com/security/online-privacy/passwords-create.aspx. Last accessed 20th May 2012.Pptuu. (2012). Protecting Your Password (1). Available:http://www.pptuu.com/show_498555_1.html. Last accessed 20thMay 2012.
  • 12. References (cont’d) UT H. (2010). Information Security Frequently Asked Questions(FAQs). Available:http://ims.uthscsa.edu/information_security/information_faq.aspx.Last accessed 20th May 2012.Webopedia. (2012). password. Available:http://www.webopedia.com/TERM/P/password.html. Last accessed20th May 2012.Wolverhampton, Uni. (2012). IT Security. Available:http://www.wlv.ac.uk/its/ default.aspx? page=6990. Lastaccessed 20th May 2012.
  • 13. ASK YOURSELF How secure is my password? http://howsecureismypassword.net/https://www.microsoft.com/security/pc-security/password- checker.aspx
  • 14. End
  • 15. Questions

×